ClickFix up look sharp: state-sponsored hackers weaponise ClickFix

Apr 20 2025

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your weekly cybersecurity newsletter that refuses to recognise hackers as biological humans ๐Ÿ‘€๐Ÿ™ˆ๐Ÿคฃ

Patch of the Week!ย ๐Ÿฉน

First thingโ€™s first, folks. Our weekly segment goes by many names. Patch of the Week, Tweak of the week. Okay, thatโ€™s itโ€ฆ ๐Ÿ˜ณ

Congrats to Apple, the cybercriminals are no matchโ€ฆ for your patch! ๐Ÿฉน

Youโ€™re the Apple of my eye ๐ŸŽ๐Ÿ‘๏ธ๐Ÿ™ƒ

๐Ÿšจ Apple Drops Critical Security Patches After Sophisticated Attacks Detected ๐Ÿ๐Ÿ”ฅ

If you're rocking an iPhone, iPad, Mac, Apple TV, or Vision Pro, itโ€™s update oโ€™clock โฐ๐Ÿ”ง Apple just patched two serious zero-day vulnerabilities being actively exploited in the wildโ€”yes, right now.

๐Ÿšจ Hereโ€™s whatโ€™s been fixed:

CVE-2025-31200 (CVSS 7.5)

๐Ÿ’ฅ Core Audio flaw โ€“ Can be triggered by a malicious audio stream (yup, just playing a tainted media file could let an attacker run code) ๐ŸŽต๐Ÿ’€

CVE-2025-31201 (CVSS 6.8)

๐Ÿ› ๏ธ RPAC component bypass โ€“ If an attacker already has read/write access, this bug could help them sneak past Pointer Authentication ๐Ÿšจ๐Ÿ”“

๐Ÿง  Apple says these were used in "extremely sophisticated attacks against specific individuals" โ€” think spyware, nation-state level stuff. Reported in part by Googleโ€™s Threat Analysis Group.

๐Ÿ”ง Fixes include:

โœ… Improved bounds checking (for the audio bug)

โœ… Removed the vulnerable code entirely (for the RPAC bypass)

๐Ÿ“ฆ These updates are now live for:

๐Ÿ“ฑ iOS & iPadOS 18.4.1 โ€“ iPhone XS & newer, various iPads

๐Ÿ’ป macOS Sequoia 15.4.1

๐Ÿ“บ tvOS 18.4.1

๐Ÿ‘“ visionOS 2.4.1

๐Ÿ’ก Reminder: Apple has now patched 5 actively exploited zero-days in 2025โ€”so this isnโ€™t rare, itโ€™s the new normal. Past issues have let bad actors:

Escalate privileges via Core Media

Disable USB lock protections

Escape the Safari/WebKit sandbox

๐Ÿ” What you should do:

โœ… Update nowโ€”even if you think youโ€™re not a target

โœ… Be cautious with suspicious media files or shady links

โœ… Keep auto-updates turned on across all Apple devices

๐Ÿ›ก๏ธ Bottom line: These bugs were being used in the wildโ€”that means real people were targeted. Whether you're a journalist, business exec, or just privacy-conscious, staying updated is the easiest way to block these high-level threats.

Stay sharp, stay patched. ๐Ÿโš”๏ธ

Now, on to this weekโ€™s hottest cybersecurity news stories:ย 

  • ๐Ÿ–ฑ๏ธ ClickFix up look sharp: state-sponsored hackers weaponise ClickFix ๐Ÿ‘พ

  • ๐Ÿค‘ Crypto users targeted w/ Node.js malware via fake Binance, TradingView ๐ŸŒ

  • ๐Ÿ•ต๐Ÿป Agent Tesla (no relation), XLoader deployed via .JSE and PoweShell ๐Ÿš

Jimโ€™ll ClickFix it ๐Ÿ’€๐Ÿ’€๐Ÿ’€

๐Ÿšจ ClickFix Goes Global: Nation-State Hackers Join the Malware Trend ๐ŸŽฏ

Iran, North Korea, and Russia are now deploying a sneaky social engineering trick called ClickFix to infect targets across the globe โ€” and it's working.

๐Ÿ“… Between late 2024 and early 2025, at least four state-sponsored groups used this technique in phishing campaigns targeting think tanks, governments, and defense contractors.

๐Ÿ› ๏ธ What is ClickFix?

ClickFix is a crafty method where hackers trick victims into infecting themselves by copying and pasting "fixes" โ€” actually malicious PowerShell commands โ€” into their systems.

It often pretends to:

โ—ย ย ย ย ย  Fix system errors โš ๏ธ

โ—ย ย ย ย ย  Verify your device โœ…

โ—ย ย ย ย ย  Download legit-looking documents ๐Ÿ“„

๐Ÿ‘ฅ Whoโ€™s Using It?

Proofpoint linked the activity to these groups:

๐Ÿœ TA427 (aka Kimsuky โ€“ North Korea)

๐Ÿช TA450 (aka MuddyWater โ€“ Iran)

๐Ÿป TA422 (aka APT28 โ€“ Russia)

๐Ÿ•ต๏ธ UNK_RemoteRogue (suspected Russian group)

๐Ÿ•ต๏ธโ€โ™‚๏ธ TA427: The Diplomat Trick

๐ŸŽฏ Target: Think tanks focused on Korean affairs

โ—ย Pretended to be a Japanese diplomat ๐Ÿฏ

โ—ย Sent meeting invites & a malicious PDF

โ—ย Led victims to a fake embassy site with โ€œinstructionsโ€

โ—ย ClickFix chain installed Quasar RAT ๐Ÿ€

๐Ÿ”ง TA450: Fake Microsoft Fix

๐ŸŽฏ Target: Sectors in the U.A.E., Saudi Arabia, U.S., Canada, and Europe

โ—ย Emails timed with Patch Tuesday updates ๐Ÿ“…

โ—ย Claimed users needed to fix a Windows vulnerability

โ—ย ClickFix chain installed Level RMM software, giving attackers full remote access ๐Ÿ–ฅ๏ธ

โ—ย ๐Ÿ›ฐ๏ธ UNK_RemoteRogue: Defense Industry Espionage

๐ŸŽฏ Target: Two major defense orgs

โ—ย Phishing from compromised Zimbra servers

โ—ย Fake Microsoft Office file + YouTube tutorial

โ—ย Users were coached to paste PowerShell code

โ—ย Delivered malware using the Empire C2 framework ๐Ÿ”—

โš ๏ธ Why It Matters

โœ”๏ธ Simple for attackers, tricky for users

โœ”๏ธ Bypasses some security software

โœ”๏ธ Trusted by nation-states & cybercriminals alike

Proofpoint warns that more state-backed groups may start experimenting with ClickFix โ€” if they havenโ€™t already.

๐Ÿ” Pro Tip

Never copy and paste code from unsolicited emails or websites โ€” no matter how official they look. If something seems off, it probably is.

Stay sharp. Donโ€™t get ClickFixed. ๐Ÿง ๐Ÿ’ป

Just say Node ๐Ÿ˜

๐Ÿšจ Malvertising Meets Node.js: Microsoft Warns of Evolving Malware Campaign ๐Ÿงช

Microsoft is tracking a dangerous new malvertising campaign that weaponizes Node.js to steal information, exfiltrate data, and sneak past defenses โ€” all under the guise of legitimate crypto trading apps.

๐Ÿ“… First spotted in October 2024, the campaign is still active and growing.

๐ŸŽฏ The Lure: Crypto Tools That Arenโ€™t What They Seem

Victims are being tricked into downloading fake installers pretending to be from:

๐Ÿ’ฐ Binance

๐Ÿ“ˆ TradingView

These downloads are hosted on fraudulent sites designed to mimic the real thing.

Once executed, the installer drops a malicious DLL named CustomActions.dll.

๐Ÿ› ๏ธ Behind the Scenes: What the Malware Does

Hereโ€™s how the infection unfolds:

๐Ÿ“‹ Info Harvesting: The DLL collects system data using WMI (Windows Management Instrumentation).

๐Ÿ•’ Persistence: A scheduled task is created to maintain long-term access.

๐Ÿ’จ Smoke & Mirrors: The malware opens a real crypto trading site in a browser window via msedge_proxy.exe to look legit.

Meanwhile, PowerShell scripts are quietly running in the background to:

โ—ย Exclude the malware from Microsoft Defender scans

โ—ย Download more payloads from a remote server

โ—ย Collect extensive data (OS, BIOS, hardware, apps)

โ—ย Send it all to a command-and-control (C2) server via HTTPS

โš™๏ธ Enter Node.js: Malware Masquerading as Web Code

The malwareโ€™s next act involves:

๐Ÿ“ฆ Downloading a ZIP archive from the C2 server

๐Ÿงช Deploying the Node.js runtime and a compiled JavaScript file (.JSC)

๐Ÿ•ธ๏ธ Using Node.js to make network connections and steal browser data

๐Ÿ“Œ Why Node.js? Itโ€™s open-source, widely used by devs, and runs JavaScript outside the browser โ€” making it a perfect disguise for malware.

๐Ÿงฏ What You Can Do

โŒ Never download software from unofficial sources โ€” especially via ads

๐Ÿ›ก๏ธ Use endpoint protection that detects script-based malware

๐Ÿง  Be suspicious of "fix-it" instructions involving terminal commands

๐Ÿ” Protect credentials and enable strong 2FA methods

Malware is getting smarter โ€” and more deceptive. Stay cautious, stay updated, and don't let your terminal become a trojan horse. ๐Ÿง ๐Ÿ’ป๐Ÿ’ฃ

Tesla just canโ€™t catch a break ๐Ÿ˜‰๐Ÿ˜‚๐Ÿ˜‚

๐Ÿšจ New Multi-Stage Malware Attack Chains: Agent Tesla, Remcos RAT, and XLoader ๐Ÿงฌ

Researchers at Palo Alto Networks Unit 42 are warning about a sophisticated, multi-layered malware campaign delivering a cocktail of info-stealers and remote access trojans โ€” including Agent Tesla, Remcos RAT, and XLoader.

๐Ÿ“Œ This isn't a smash-and-grab. It's a well-orchestrated, multi-stage attack chain designed to evade sandboxes, confuse analysts, and ensure payload delivery.

๐Ÿ“ฅ It All Starts with a Phish

๐Ÿ—“๏ธ First spotted in December 2024, the attack kicks off with a phishing email disguised as an order confirmation. The email claims a payment was made and urges the target to review an attached file โ€” a malicious 7-Zip archive.

Inside the archive:

๐Ÿงพ A .JSE (JavaScript Encoded) file โ€” the ignition for the entire attack chain

Once launched, this file contacts an external server to download a Base64-encoded PowerShell script.

๐Ÿ“ฆ Payload Decoding and Execution

Hereโ€™s what happens next:

๐Ÿ” The PowerShell script decodes the Base64 payload

๐Ÿ’พ Writes the decoded payload to the Windows temp directory

๐Ÿš€ Executes it, launching a new dropper stage

The second-stage dropper can be compiled in .NET or AutoIt, depending on the variant.

โš”๏ธ Diverging Paths: .NET vs AutoIt Droppers

๐Ÿ”ง If .NET:

The malware decrypts and injects Agent Tesla / Snake Keylogger / XLoader into the memory of a legitimate Windows process: RegAsm.exe

๐ŸŽญ If AutoIt:

โ—ย Adds another obfuscation layer

โ—ย The AutoIt script decrypts a payload that injects a .NET file into RegSvcs.exe, delivering Agent Tesla

๐Ÿ’ก Goal: Make analysis harder while ensuring successful execution.

๐Ÿงฑ Layered Simplicity = Resilience

"The attackerโ€™s focus remains on a multi-layered attack chain rather than sophisticated obfuscation,"

โ€“ Saqib Khanzada, Unit 42

By stacking basic techniques, the attackers build a resilient and stealthy infection flow, rather than relying on flashy obfuscation.

๐Ÿ›ก๏ธ Defensive Tips:

โ—ย Avoid opening files from unknown or suspicious emails

โ—ย Monitor for unexpected usage of system processes like PowerShell or RegAsm.exe

โ—ย Invest in behavioral detection and EDR tools

โ—ย Segment high-value assets from user workstations

Attackers arenโ€™t just getting more technical โ€” theyโ€™re getting more strategic. The more layers they add, the harder they are to peel back. ๐Ÿง…๐Ÿ’€

๐Ÿ—ž๏ธ Extra, Extra! Read all about it! ๐Ÿ—ž๏ธ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตCrypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆBitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think.

So long and thanks for reading all the phish!

footer graphic cyber security newsletter

Recent articles